1
Anonymity and Privacy / Re: Complete Anonymity
« on: April 15, 2015, 08:02:50 pm »
I have looked around some and I don't believe my original steps ensure absolute anonymity.
A Tor user can be located if they utilize a website that runs Javascript.
Tutanota is not a good solution either for email purposes apparently. The company is based out of Germany where the NSA supposedly runs most of it's operations out of & Germany is known to easily comply with government requests, especially that of the USA. I had read that Tutanota can decrypt user information if they are told and/or deem and account to be used for "illicit" purposes, so it appears to me Tutanota simply have open rights to access your info when they, or someone else wishes (with "proper" procedure). So much for encrypted email that they claim.....
Guerrilla Mail states to use Javascript on the front end of their website, so I know a user using just Tor can be tracked utilizing Guerrilla Mail.
A user's ISP can determine that you have accessed Tor, then you can be located that way. Supposedly accessing a front-end VPN, then logging onto Tor blocks an ISP from being able to determine that you have accessed Tor, but an ISP can still see that you have accessed a VPN. I'm not sure if this would then allow a user's ISP to connect a user's VPN usage to that of their usage of the Tor browser? Would accessing a VPN, then> Tor, then> a VPN do anything to circumvent the above? You would want to purchase the back-end VPN with bitcoin or a counterpart to conceal identity of that VPN, if this is a feasible solution.
I am now considering using a small chain of Anonymous remailers like CypherPunk, and then at the end of the remail chain using a Mixmaster remailer to reroute the response back to me via another return-chain of Anonymous remailers. I have not tested this, but this is what I am thinking if it's doable. Supposedly Anonymous remailers do not retain communication logs and I don't believe they can access your info anyways because they utilize PGP.
Any input on the above is appreciated. I am by no means a guru on any of this, I'm learning as I look into the above.
A Tor user can be located if they utilize a website that runs Javascript.
Tutanota is not a good solution either for email purposes apparently. The company is based out of Germany where the NSA supposedly runs most of it's operations out of & Germany is known to easily comply with government requests, especially that of the USA. I had read that Tutanota can decrypt user information if they are told and/or deem and account to be used for "illicit" purposes, so it appears to me Tutanota simply have open rights to access your info when they, or someone else wishes (with "proper" procedure). So much for encrypted email that they claim.....
Guerrilla Mail states to use Javascript on the front end of their website, so I know a user using just Tor can be tracked utilizing Guerrilla Mail.
A user's ISP can determine that you have accessed Tor, then you can be located that way. Supposedly accessing a front-end VPN, then logging onto Tor blocks an ISP from being able to determine that you have accessed Tor, but an ISP can still see that you have accessed a VPN. I'm not sure if this would then allow a user's ISP to connect a user's VPN usage to that of their usage of the Tor browser? Would accessing a VPN, then> Tor, then> a VPN do anything to circumvent the above? You would want to purchase the back-end VPN with bitcoin or a counterpart to conceal identity of that VPN, if this is a feasible solution.
I am now considering using a small chain of Anonymous remailers like CypherPunk, and then at the end of the remail chain using a Mixmaster remailer to reroute the response back to me via another return-chain of Anonymous remailers. I have not tested this, but this is what I am thinking if it's doable. Supposedly Anonymous remailers do not retain communication logs and I don't believe they can access your info anyways because they utilize PGP.
Any input on the above is appreciated. I am by no means a guru on any of this, I'm learning as I look into the above.